Softlifting: Exploring Determinants of Attitude

Softlifting, or the illegal duplication of copyrighted software by individuals for personal use, is a serious and costly problem for software developers and distributors. Understanding the factors that determine attitude toward softlifting is important in order to ascertain what motivates individuals to engage in the behavior. We examine a number of factors, including personal moral obligation (PMO), perceived usefulness, and awareness of the laws and regulations governing software acquisition and use, along with facets of personal self-identity that may play a role in the development of attitudes and therefore intentions regarding this behavior. These factors are examined across multiple settings expected to be pertinent to our survey respondents: home, work and school. Personal moral obligation and perceived usefulness are significant predictors of attitude across all settings. Past behavior is a significant predictor of intention across all settings, and a significant predictor of attitude in the home setting. We find evidence that awareness of the law causes a less favorable evaluation of softlifting in the school setting only, but has little effect in the home and work settings. As in previous studies, attitude is a significant predictor of intent. We do not find indications that one’s personal self-identity influences one’s attitude towards the behavior and the intention to perform it, except in the case of legal identity, where marginally significant effects are found in the work environment.

[1]  T. Jones Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .

[2]  M. Snyder Self-monitoring of expressive behavior. , 1974 .

[3]  Richard A. Reid,et al.  Software piracy: Is it related to level of moral judgment? , 1994 .

[4]  Wynne W. Chin,et al.  The Effects of Group Attitudes Toward Alternative GDSS Designs on the Decision‐making Performance of Computer‐Supported Groups* , 1994 .

[5]  James Weber,et al.  Adapting Kohlberg to Enhance the Assessment of Managers’ Moral Reasoning , 1991, Business Ethics Quarterly.

[6]  Timothy Paul Cronan,et al.  Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..

[7]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[8]  I. Ajzen,et al.  Predicting dishonest actions using the theory of planned behavior , 1991 .

[9]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[10]  Hsing Kenneth Cheng,et al.  Toward a profile of student software piraters , 1996 .

[11]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[12]  K. R. Conner,et al.  Software piracy: an analysis of protection strategies , 1991 .

[13]  Mary Lippitt Nichols,et al.  An investigation of the moral reasoning of managers , 1993 .

[14]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[15]  Volker Schneider,et al.  Business Software Alliance , 2009 .

[16]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[17]  I. Ajzen The theory of planned behavior , 1991 .

[18]  Susan J. Harrington,et al.  Why People Copy Software and Create Computer Viruses , 1989 .

[19]  Chee-Sing Yap,et al.  Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..

[20]  Cynthia K. Riemenschneider,et al.  Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests , 1997, Inf. Syst. Res..

[21]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[22]  Andrew Dillon,et al.  User acceptance of information technology , 2001 .

[23]  Jane M. Howell,et al.  Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..

[24]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[25]  Sarah E. Hutchinson,et al.  Computers and Information Systems , 1995 .

[26]  Henk Elffers,et al.  Exploring the limits of self-reports and reasoned action: An investigation of the psychology of tax evasion behavior. , 1988 .

[27]  Vijay Mahajan,et al.  Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .

[28]  Wallace A. Wood,et al.  Situational determinants of software piracy: An equity theory perspective , 1996 .

[29]  Brian J. Reithel,et al.  The Software Piracy Dilemma in Public Administration: A Survey of University Software Policy Enforcement , 1994 .

[30]  M. Chang Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior , 1998 .

[31]  Blair H. Sheppard,et al.  The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research , 1988 .

[32]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[33]  Richard L. Gorsuch,et al.  Moral obligation and attitudes: Their relation to behavioral intentions. , 1983 .

[34]  Dennis L. Dossett,et al.  Attitude–behavior relations: A comparison of the Fishbein-Ajzen and the Bentler-Speckart models. , 1983 .

[35]  Fred D. Davis User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts , 1993, Int. J. Man Mach. Stud..

[36]  P. Simpson,et al.  Softlifting: A model of motivating factors , 1994 .

[37]  Wilbur J. Scott,et al.  Tax evasion and mechanisms of social control: A comparison with grand and petty theft , 1982 .

[38]  Jung P. Shim,et al.  A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .

[39]  Hsing K. Cheng,et al.  To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..

[40]  Michael Bommer,et al.  A behavioral model of ethical and unethical decision making , 1987 .

[41]  William R. Swinyard,et al.  The morality of software piracy: A cross-cultural analysis , 1990 .

[42]  Clifford M. Koen,et al.  Software piracy and its legal implications , 1997, Inf. Manag..

[43]  Jane M. Howell,et al.  Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model , 1994, J. Manag. Inf. Syst..